3 research outputs found

    Electronic Preventive Maintenance

    Get PDF
    This project give the details about the approach and research done for electronic preventive maintenance system, which in this project will involved Microsoft Access, HanDBase® Software, VB .Net, Microsoft .Net framework, Microsoft Active Sync, Microsoft ActiveX Control and also some other software that will be used to support this system. This report will formerly cover about the analysis and design of the Electronic Preventive Maintenance project In plant fieldwork, conceptually the initial stage in any documentation procedure, the issue of portability is important in two senses: first, the sense of platform interoperability and second, in the sense of mobility. With this concept, it wills strong enough the reason why electronic preventive maintenance is a must in plant fieldwork. The following are covered by the report: - The details description of the current framework that can used to develop this system. - The analysis of current system, problems of that current system, finds the solution for the problems and also the significant of the project. - Relate the objective of the project and find the way to achieve the objective. - Relevancy of the project and feasibility of project within scope and time fram

    Manhattan_Project.exe: A Nuclear Option for the Digital Age

    Get PDF
    This article explores the possible implications and consequences arising from the use of an artificial intelligence construct as a weapon of mass destruction. The digital age has ushered in many technological advances, as well as certain dangers. Chief among these pitfalls is the lack of reliable security found in critical information technology systems. These security gaps can give cybercriminals unauthorized access to highly sensitive computer networks that control the very infrastructure of the United States. Cyberattacks are rising in both frequency and severity and the response by the U.S. has been ineffective. A cyber-weapon of mass destruction (CWMD) implementing an artificial intelligence construct would operate on different fundamental principles than a kinetic WMD, but it would be no less effective in eliminating threats to the security of domestic information networks. This article will first examine the current state of artificial intelligence as it exists in both the private sector and in military and intelligence applications. Second, this article will discuss the distinctions between kinetic war and cyberwar and the deployment of WMDs; the capabilities and applications of a possible CWMD will be discussed at this point as well. Third, issues concerning international law will be addressed as applicable to artificial intelligence, automated warfare, and WMDs generally. Finally, this article will examine some dangers associated with the use of an artificial intelligence construct capable of learning as well as the necessity of such a program

    Manhattan_Project.exe: A Nuclear Option for the Digital Age

    Get PDF
    This article explores the possible implications and consequences arising from the use of an artificial intelligence construct as a weapon of mass destruction. The digital age has ushered in many technological advances, as well as certain dangers. Chief among these pitfalls is the lack of reliable security found in critical information technology systems. These security gaps can give cybercriminals unauthorized access to highly sensitive computer networks that control the very infrastructure of the United States. Cyberattacks are rising in both frequency and severity and the response by the U.S. has been ineffective. A cyber-weapon of mass destruction (CWMD) implementing an artificial intelligence construct would operate on different fundamental principles than a kinetic WMD, but it would be no less effective in eliminating threats to the security of domestic information networks. This article will first examine the current state of artificial intelligence as it exists in both the private sector and in military and intelligence applications. Second, this article will discuss the distinctions between kinetic war and cyberwar and the deployment of WMDs; the capabilities and applications of a possible CWMD will be discussed at this point as well. Third, issues concerning international law will be addressed as applicable to artificial intelligence, automated warfare, and WMDs generally. Finally, this article will examine some dangers associated with the use of an artificial intelligence construct capable of learning as well as the necessity of such a program
    corecore